StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Security System - Report Example

Cite this document
Summary
This report "Biometric Security System" presents the use of iris recognition banks that can be able to reduce fraud activities and guard the customer’s bank accounts. By the use of the iris recognition system, the bank will be able to achieve its strategy…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful

Extract of sample "Biometric Security System"

Biometric Security Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Name Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Course Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Lecturer Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx August 3rd, 2012. Introduction For many years the banking industry has been faced with issues related to the fraud and tremendous steps have been made so as to ensure that that they do not lose money because of fraud. In response to this issue the bank have decided to introduce a biometric system where the customers will use iris recognition so as to be able to access their bank accounts. Biometric system are termed as the automatic recognition systems that are used to recognize a specific distinctive characteristic or a personal trait of a certain individual and it is used to identify the individuals or verify that the individual is the one he claims to be (Daugman n.d). The IRIS is seen as a major feature that can be used since it is a more protected organ and it is less prone to injury. This method of recognition is termed as the process used to recognize an individual by analyzing the random iris pattern (Daugman n.d). The biometric system been used raises some issues related to the privacy of the customers data as well as effectiveness of the system when implemented in the bank. Hence the thesis statement of the paper is: do the use of the iris biometric system aid in reducing fraud cases in banks. Argument 1: Privacy As compared to other existing technologies Biometric system have a great effect on the privacy of individuals. If iris recognition biometrics can be deployed in the right manner they can actually protect privacy but if not applied they can lead to a loss of personal privacy. Privacy of an individual data is seen as a major concern to most individuals. There seems to be an unvarying challenge of trying to solve privacy issues in biometrics systems. The iris biometric data are very personal information since they contain information about an individual. They are considered as been among the most sensitive since they are fixed and can rarely be changed and though certain medical procedures may alter the iris the fine texture that is associated with the iris rarely changes. Counter argument However to counter argue the statement in as much as the biometric system at times ensures the privacy of personal information sometimes this individual right is at times not adhered to. Sometimes fraudsters are able to get the private information regarding a certain client thus the privacy of information is not achieved though it is one of the major reason behind the implementation of the iris recognition biometric method. There are also other instances in which a customer can be forced to give his details against his own will. Privacy is also major concern since the data collected about the clients may be at times used for other purposes rather than the main purpose for which it was intended for. The possibility of multiple uses of the data collected is relatively high. In instances when the identifier is collected as well as stored in a database, the is easily accessible and can at times be matched against any other future samples though at times they are usually collected to entirely different purposes. Refute In refute, as information about the privacy of information is been raised as a major concern by many people, measures ought to be implemented to ensure the privacy of the customers data. For instance the information collected from the customer ought to be used for the intended purpose only (Cambier n.d). This will ensure that their privacy of an individual as well as of his data is achieved. Also based on an individual privacy at times when the data have to be used it must be used with the contest of the individual. This will ensure that the privacy of individuals as well as their data. Effectiveness The IRIS method of biometric security has brought about a sign of relief in terms of effectiveness more so in reducing fraud in the banking industry. With the application of the IRIS, the process of recognizing the details of a person is done through the analysis of the random pattern of the IRIS of a person. These features that are analysed in a person are distinct to every person. Fraudsters are finding it hard for them to assess personal information of a person in a bank online, as the person must first of all have his or her eye scanned before he or she is able to assess the information in the bank (Landon 2004). Therefore banks are assured that the person assessing certain information in the bank is the authentic user of the information and not just granting access of crucial information to anyone, fraudsters included. The IRIS biometric security measure ensures that customers will have their authentication to a bank for a long time and thus regarded as a stable method as opposed to carrying of cards which can easily get lost or damaged. In addition, through the IRIS biometric method, it is not easily spoofed by fraudsters as the liveness detection employed in the IRIS method allows the reading of the psychological science of life of the applicant (Bori & Touche 2005, pp. 30). Effectiveness of the IRIS biometric system in ensuring security in the banking sector is also associated with advantages for example being fool proof as there is no way a fraudster can fool or claim another person’s identification through the IRIS method. In this regard too, customers are further protected from fraudsters for they do not have to carry identification cards which fraudsters can have access to or steal from the customers and thus ID fraud is also eliminated. Counter Argument In as much as the IRIS biometric security is seen as a gateway towards eliminating the access of customers personal information in a bank, there are certain drawbacks and implications involved in the measures and that form the counter argument of how it has lead to the effectiveness in terms of shielding banks from losing money to fraudsters. While, the IRIS biometric method can grant banks the comfort that information is secure by only allowing the real access to the only authorized people, it is paramount to note that authentication also needs to be done to employees of the banks and not only the customers of the banks. This not only ensures that the banks do not lose money to fraudsters, but it also ensures that the banks corporate image is improved through ensuring that there is maximum internal security and hence eliminated the inside job fraud activities networks in employees. Issues regarding forced authentication of customers by fraudsters are also not fully eliminated through the IRIS method, as a customer can be forced to go through the whole process of authentication and the access of information would be easy to the fraudsters. However, in spite of the drawbacks of the IRIS biometric security system use in banks, it is a step further in eliminating that fraudsters do not get access to personal information in the bank that can lead to the bank losing money and is way safer and effective as opposed to some methods like IDs and signature as the methods of authentication (Ratha, Connell & Bolle 2001, pp. 615). Refutation The characteristic of the trait being used in ensuring that fraudsters do not have access to crucial information in the bank is subject to change as a person ages. The changes can be drastic and gradual if accelerated by such factors as illnesses, injuries to the eyes, age and exposure to harmful substances for instance chemicals. This then ignites the question of the modality of the IRIS biometric method in ensuring that there is security in the banks. Conclusion The argument above affirms that through the use of iris recognition banks can be able to reduce fraud activities and guard the customer’s bank accounts. By the use of the iris recognition system, the bank will be able to achieve its strategy (Dye n.d). Iris recognition has gained a lot of acceptance over time and a number of organizations are opting to adopt it in their organization. This is mainly based on the fact that it seems more reliable since it cannot be stolen like it is the case for the PIN codes and passwords. The iris recognition also offers improved recognition. The iris is an internal organ and it’s always protected against any form of damage. The iris is also unique and has affine texture. Also despite the fact that certain medical procedures can alter the shape of the iris, the fine texture associated with it will for a long time remain remarkably stable for a long period of time. References Bori Toth Deloitte & Touche LLP, 2005 ” Liveness detection for Iris detection”, NIST Workshop on Biometrics and E-Authentication over Open Networks, 30-31 March 2005, Gaithersburg (MD). Daugman, J n.d, Some Possible Applications of Iris Recognition, viewed 2 August, 2012, Daugman, J n.d, Advantages of the Iris for Identification and Disadvantages of the Iris for Identification, viewed 2 august, 2012, Dye, B., Gerttula, J., Kerner, J. & O’Hara, B n.d, An Introduction to Biometrics, < http://www.stanford.edu/~bjohara/iris.htm > Cambier, J n.d, Iris Recognition and Network Security. Landon, B. 2004 Security Biometrics Integrates Biometric Signature Authentication into Mainstream Business Applications. Retrieved from http://www.pdatoday.com/more/1242_0_1_0_M/. Retrieved on 1st August, 2012. Ratha, N. K., Connell, J. H. & Bolle, R. M. 2001 Enhancing Security and Privacy in Biometrics _ Based Authentication Systems. IBM Systems Journal. 40 (3), 614 – 634. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Biometric Security System Report Example | Topics and Well Written Essays - 1250 words, n.d.)
Biometric Security System Report Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/2047952-1-a-bank-is-worried-about-losing-money-because-of-fraud-so-it-has-decided-to-introduce-a
(Biometric Security System Report Example | Topics and Well Written Essays - 1250 Words)
Biometric Security System Report Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/2047952-1-a-bank-is-worried-about-losing-money-because-of-fraud-so-it-has-decided-to-introduce-a.
“Biometric Security System Report Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/2047952-1-a-bank-is-worried-about-losing-money-because-of-fraud-so-it-has-decided-to-introduce-a.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Security System

Computer Physical Security

In particular the protection system can check up your finger-print, figure of your retina, spectral characteristics of your voice and other characteristics.... So we may define a biometric system as 'a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user'2.... The majority of biometric systems operate in the following way: the digital mark of a fingerprint, an iris or a voice is stored in the system database....
4 Pages (1000 words) Essay

The Introduction of the Biometric System

The introduction of the Biometric system has taken new strides as we usher into the next decade.... The paper "Biometric system" discusses the pros and cons of the system and also throws light whether it infringes the privacy of an individual.... hellip; Many Europeans countries have considered adopting this system to have a much more synchronized process of identification as well as the compilation of data with regard to the citizens of the countries....
6 Pages (1500 words) Essay

Biometrics: a tool for information security

In such circumstances, it is necessary to design a reliable system that can minimize the chances of unauthorized use of information.... For example, it stores the physical attributes of the users of the system in which the information is stored.... The technology then matches all stored attributes with the attributes of the person trying to access the system.... Only in case a match is found, the system becomes accessible for the person....
2 Pages (500 words) Essay

Stengths and weaknesses of biometrics mechanis,s

It impossible that the system made mistakes as proved in crimesRetinal scanningThere is no known way to replicate a retina scanning, which makes it the safest bet (“Comparative study of different biometric features”)Latency can take away 10 seconds which is very difficult.... Gait technology has been a prominent force that has been the driving force for signature recognition to drive security Many new improvements have been the catalyst to improve these programs (“Comparative study of different biometric features”). Analyzing this, it is clear… For instance, the password method is the cheapest technology but is the most vulnerable....
2 Pages (500 words) Essay

What Will Provide the Best Input Control - EAC System or Biometrics

On the other hand, controlled exit system practices the similar security system for the individuals moving in both the ways i.... The paper “What Will Provide the Best Input Control – EAC system or Biometrics?... hellip; An Electronic Access Control system (EAC) is a mechanism for security control which is used physically or automatically in order to manage the entry and exit of protected areas of an organization or site of work.... It has been viewed that both biometrics and Electronic Access Control system have almost similar requirements wherein the user of the system must authenticate his or her admission before entering the building....
14 Pages (3500 words) Coursework

Privacy vs Protection of Assets, Issues of Biometric Technologies in Organizations

Something else to remember about biometric provisions, security, and insurance of protection, is the easier levels of the structural planning the biometric system may navigate.... What then is the underlying system building design between you and the requisition?... It is as paramount to comprehend and execute security along the system pathways as it is to actualize security for the provision itself (Bowman, 2005 p....   Obviously, some system for character confirmation, demonstrating who you are, might be presupposed throughout the enlistment procedure of a biometric to forestall wholesale fraud (Bowman, 2005 p....
5 Pages (1250 words) Essay

The Application of Biometric Technology and the Convenience

he prevailing publicity regarding biometric is largely attributed to its application in the public sector; nevertheless, biometric security technologies evolved owing to the proliferation of computer security threats.... hellip; Biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources.... The main reason propelling the use of biometric technology for tighter border control is that the conventional security approaches never offer adequate level of security....
5 Pages (1250 words) Essay

Cash Register System Design

The paper "Cash Register system Design" enlightens the reader on the various ways to solve system design-related problems.... The study focuses on the design issue of the system, the correction of those issues, tasks associated with the change of interface, the challenges of incorporating security.... hellip; The system had inbuilt problems that deterred efficient operations of the fast-food joint.... First, the system was designed to authenticate users with the use of passwords and usernames....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us